Custom environment variables for your deployment/application using secrets

The root360 platform does provide a default set of environment variables already, e.g. details about other components (databases, cache layers, filesystems and so on) or the current environment (test, stage, prod, ….). Using those environment variables via install.sh you can configure your application with the appropriate endpoints of the environment.

You can enhance or extend this list of variables by adding new items yourself using the https://root360.atlassian.net/wiki/spaces/KB/pages/2014350252. The content will be added to an encrypted vault inside AWS SecretsManager.

To verify the values on the targets you’re setting the secrets for, you can run sudo get-application-env (see https://root360.atlassian.net/wiki/spaces/KB/pages/2014351825) on these roles.


Variables already being provided by Managed AWS Hosting platform can’t be overwritten. Duplicate variable names will be post-fixed with _CONFLICTING_KEY.

Preconditions

List Secrets

As the secrets scope is per role, you must provide a role parameter.

1 2 3 4 5 6 ~$ r3 secret list --role example +-------------+-----------------------------------------------+ | Secret | Value | +-------------+-----------------------------------------------+ | EXAMPLE_VAR | these-are-not-the-secrets-you-are-looking-for | +-------------+-----------------------------------------------+

Add/Update secrets

Secrets must be added/updated for a specific role.

1 2 3 4 5 6 7 8 ~$ r3 secret update --role example --name MYVAR --value "may-the-cloud-be-with-you" 2020-11-17 10:42:40 r3-11364 SUCCESS Secret "MYVAR" successfully updated. +-------------+-----------------------------------------------+ | Secret | Value | +-------------+-----------------------------------------------+ | EXAMPLE_VAR | these-are-not-the-secrets-you-are-looking-for | | MYVAR | may-the-cloud-be-with-you | +-------------+-----------------------------------------------+

Delete secrets

Secrets must be deleted for a specific role.

1 2 3 4 5 6 7 ~$ r3 secret delete --role example --name MYVAR 2020-11-17 10:44:18 r3-11387 SUCCESS Secret "MYVAR" successfully deleted. +-------------+-----------------------------------------------+ | Secret | Value | +-------------+-----------------------------------------------+ | EXAMPLE_VAR | these-are-not-the-secrets-you-are-looking-for | +-------------+-----------------------------------------------+

 

Related tutorials

Related components